<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://annchang.blog/2025/05/24/how-ai-enables-blockchain-and-digital-assets-security/</loc><lastmod>2026-03-06T00:51:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2026/01/18/from-check-the-box-to-business-enabler-how-ai-is-revolutionizing-modern-grc/</loc><lastmod>2026-01-19T03:01:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2025/07/30/ai-governance-and-iso-42001-certification-building-trustworthy-responsible-ai-solutions/</loc><lastmod>2026-01-19T01:18:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2024/03/06/risk-economics-and-quantification-3/</loc><lastmod>2026-01-15T15:52:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2024/03/16/cloud-native-compliance-as-code/</loc><lastmod>2026-01-15T15:52:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2025/05/24/ai-to-enable-blockchain-and-digital-assets-security/</loc><lastmod>2026-01-15T15:52:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2025/07/15/security-for-ai-and-ai-for-security-the-dual-frontier-of-cyber-defense/</loc><lastmod>2026-01-15T15:51:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2025/07/19/web3-and-cybersecurity-navigating-the-next-digital-frontier/</loc><lastmod>2026-01-15T15:51:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2025/10/04/how-gen-ai-is-reshaping-cyberattacks-and-what-you-can-do/</loc><lastmod>2026-01-15T15:51:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2025/10/05/securing-the-future-of-ai-integration-a-deep-dive-into-model-context-protocol-mcp-security/</loc><lastmod>2026-01-15T15:50:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2025/10/12/people-and-culture-the-real-edge-in-cyber-defense/</loc><lastmod>2025-10-12T15:40:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2025/10/12/know-yourself-know-your-enemy-breaking-the-kill-chain-to-win-every-cyber-battle/</loc><lastmod>2025-10-12T14:14:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2025/10/05/transforming-threat-modeling-how-ai-and-automation-are-making-security-scalable/</loc><lastmod>2025-10-05T16:23:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2025/10/04/mastering-cyber-defense-in-depth-look-at-common-cyberattack-types-indicators-and-technical-defenses/</loc><lastmod>2025-10-04T18:32:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2025/10/04/ai-powered-credential-stuffing-from-prevention-to-detection-and-response/</loc><lastmod>2025-10-04T14:56:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2025/07/27/kubernetes-security-building-a-cloud-native-security-framework-for-the-modern-era/</loc><lastmod>2025-07-27T23:56:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/16/cybersecurity-career-paths-2/</loc><lastmod>2025-07-15T19:46:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/07/07/ai-aided-cybersecurity-2/</loc><lastmod>2025-07-15T19:46:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2024/07/15/from-shield-to-sword-how-cybersecurity-fuels-business-growth/</loc><lastmod>2025-07-15T19:45:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2025/05/24/blockchain-and-digital-assets-security-the-transformative-role-of-the-chief-information-security-officer/</loc><lastmod>2025-06-02T22:42:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2024/07/28/ai-ethics-data-governance-building-a-responsible-future/</loc><lastmod>2024-07-28T22:03:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2024/07/28/unlocking-the-power-of-ai-ml-observability-from-development-to-production/</loc><lastmod>2024-07-28T22:00:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/07/07/generative-ai/</loc><lastmod>2024-03-16T18:41:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/07/08/container-security/</loc><lastmod>2023-07-08T13:26:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/07/07/containers-vs-virtual-machines-vms/</loc><lastmod>2023-07-07T19:46:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/07/07/ai-aided-threat-detection/</loc><lastmod>2023-07-07T19:07:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/07/07/explainable-ai/</loc><lastmod>2023-07-07T18:25:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/07/07/responsible-ai/</loc><lastmod>2023-07-07T18:24:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/07/07/conversational-ai/</loc><lastmod>2023-07-07T18:23:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/07/07/fido2-passwordless-authentication/</loc><lastmod>2023-07-07T16:48:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/24/symmetric-vs-asymmetric-encryption-whats-the-difference/</loc><lastmod>2023-06-24T21:13:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/24/what-is-encryption-key-management-and-how-does-it-work/</loc><lastmod>2023-06-24T21:12:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/24/what-is-oauth-authentication/</loc><lastmod>2023-06-24T21:11:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/24/what-is-certificate-based-authentication/</loc><lastmod>2023-06-24T21:10:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/24/certificate-based-authentication-vs-oauth/</loc><lastmod>2023-06-24T21:07:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/24/certificate-based-authentication-vs-token-based-authentication/</loc><lastmod>2023-06-24T21:06:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/24/certificate-based-authentication-vs-multi-factor-authentication-mfa/</loc><lastmod>2023-06-24T21:04:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/21/github-vs-gitlab-which-one-is-right-for-you/</loc><lastmod>2023-06-22T02:50:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/21/siem-vs-soar-vs-xdr-whats-the-difference/</loc><lastmod>2023-06-22T01:22:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/21/managed-defense/</loc><lastmod>2023-06-22T00:36:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/21/attack-surface-management/</loc><lastmod>2023-06-22T00:32:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/21/encryption/</loc><lastmod>2023-06-22T00:22:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/21/cloud-data-loss-prevention-dlp/</loc><lastmod>2023-06-22T00:04:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/21/cloud-ai-momentum/</loc><lastmod>2023-06-21T23:43:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/21/ai-aided-cybersecurity/</loc><lastmod>2023-06-21T23:27:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/21/threat-intelligence-driven-security/</loc><lastmod>2023-06-21T22:54:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/21/red-teaming-and-offensive-security/</loc><lastmod>2023-06-21T22:45:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/21/cybersecurity-is-a-journey-not-a-destination/</loc><lastmod>2023-06-21T21:30:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/21/risk-economics/</loc><lastmod>2023-06-21T16:12:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/21/cyber-risk-quantification/</loc><lastmod>2023-06-21T16:09:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/21/risk-economics-and-quantification/</loc><lastmod>2023-06-21T15:28:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/21/software-defined-vehicles-the-promise-and-the-emerging-cyber-threats/</loc><lastmod>2023-06-21T04:36:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/20/open-source-software-security-and-vulnerability-management/</loc><lastmod>2023-06-20T23:45:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/20/malware-classification-and-deep-dive/</loc><lastmod>2023-06-20T14:59:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/20/supply-chain-security/</loc><lastmod>2023-06-20T14:53:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/20/what-are-the-things-that-only-cloud-providers-can-do/</loc><lastmod>2023-06-20T14:49:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/20/cloud-key-management/</loc><lastmod>2023-06-20T14:37:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/20/cloud-encryption/</loc><lastmod>2023-06-20T14:33:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/20/cloud-native-application-development/</loc><lastmod>2023-06-20T14:28:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/20/security-as-business-enabler/</loc><lastmod>2023-06-20T14:21:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/20/application-modernization/</loc><lastmod>2023-06-20T14:15:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/20/kubernetes-artifact-analysis/</loc><lastmod>2023-06-20T14:00:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/20/kubernetes/</loc><lastmod>2023-06-20T13:54:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/20/incident-response-on-prem-vs-cloud/</loc><lastmod>2023-06-20T13:39:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/20/incident-response-in-the-cloud-world/</loc><lastmod>2023-06-20T13:37:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/20/how-to-evaluate-cloud-providers-security-posture/</loc><lastmod>2023-06-20T13:12:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/20/how-to-evaluate-cloud-providers/</loc><lastmod>2023-06-20T12:42:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/20/cloud-security-in-finance-industry/</loc><lastmod>2023-06-20T12:30:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/20/how-should-i-start-on-cloud-security/</loc><lastmod>2023-06-20T12:25:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/20/the-different-ways-that-attackers-can-exploit-cloud-vulnerabilities/</loc><lastmod>2023-06-20T12:25:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/20/the-benefits-of-becoming-a-cloud-applications-developer/</loc><lastmod>2023-06-20T12:24:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/19/risk-management/</loc><lastmod>2023-06-20T00:52:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/19/the-cloud-introduces-new-attack-vectors-how-should-we-protect-ourselves-from-them/</loc><lastmod>2023-06-19T08:29:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/15/from-on-prem-to-cloud-security/</loc><lastmod>2023-06-19T08:18:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/15/different-ways-that-attackers-can-exploit-cloud-vulnerabilities/</loc><lastmod>2023-06-19T08:18:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/15/unique-challenges-of-cloud-security/</loc><lastmod>2023-06-19T08:18:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/15/how-cloud-improves-developer-experience/</loc><lastmod>2023-06-19T08:18:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/15/our-passwordless-future/</loc><lastmod>2023-06-19T08:18:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/16/cloud-shared-responsibility-model/</loc><lastmod>2023-06-19T08:17:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/16/cloud-vulnerability-management/</loc><lastmod>2023-06-19T08:17:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/18/governance-by-design/</loc><lastmod>2023-06-19T08:17:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/19/career-advice-take-feedback-to-heart/</loc><lastmod>2023-06-19T08:17:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/19/career-advice-leadership/</loc><lastmod>2023-06-19T08:17:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/19/security-recommendations-for-families-securing-your-online-life-in-2023/</loc><lastmod>2023-06-19T08:17:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/19/career-advice-start-learning-cybersecurity-today/</loc><lastmod>2023-06-19T08:17:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/19/career-advice-always-assume-good-intentions/</loc><lastmod>2023-06-19T08:16:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/19/career-advice-model-for-a-successful-career/</loc><lastmod>2023-06-19T08:16:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/19/career-advice-dont-let-the-perfect-be-the-enemy-of-the-good/</loc><lastmod>2023-06-19T08:16:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/19/career-advice-step-out-of-your-comfort-zone/</loc><lastmod>2023-06-19T08:16:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/19/career-advice-women-in-cybersecurity/</loc><lastmod>2023-06-19T08:15:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/19/passkeys/</loc><lastmod>2023-06-19T08:15:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/19/vulnerability-management/</loc><lastmod>2023-06-19T08:15:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/19/the-zero-trust-model-redefining-security-in-the-digital-age/</loc><lastmod>2023-06-19T08:15:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/19/cloud-access-control-vs-on-prem-access-control/</loc><lastmod>2023-06-19T08:15:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/19/how-on-prem-applications-developer-can-transition-to-cloud-applications-developer/</loc><lastmod>2023-06-19T08:15:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/19/the-steps-that-an-on-prem-application-developer-can-take-to-transition-to-a-cloud-applications-developer/</loc><lastmod>2023-06-19T08:15:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/19/cloud-devsecops/</loc><lastmod>2023-06-19T08:15:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/2023/06/19/secure-your-online-life-in-2023/</loc><lastmod>2023-06-19T08:14:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://annchang.blog/sample-page/</loc><image:image><image:loc>https://annchang.blog/wp-content/uploads/2023/06/annchangsecurityphoto-1.jpg</image:loc><image:title>AnnChangSecurityPhoto</image:title></image:image><image:image><image:loc>https://annchang.blog/wp-content/uploads/2023/06/annchangsmall.jpg</image:loc><image:title>AnnChangSmall</image:title></image:image><image:image><image:loc>https://annchang.blog/wp-content/uploads/2023/06/annchangsecurityphotocarrieversion-1.jpg</image:loc><image:title>AnnChangSecurityPhotoCarrieVersion (1)</image:title></image:image><image:image><image:loc>https://annchang.blog/wp-content/uploads/2023/06/annchang-1.png</image:loc><image:title>annchang (1)</image:title></image:image><lastmod>2023-06-18T02:29:27+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://annchang.blog</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2026-03-06T00:51:36+00:00</lastmod></url></urlset>
